Browse the School's full catalogue of courses, events, programs and other learning tools. For recommended learning by theme or community, view our learning paths or learning series.
This course explores basic cyber security concepts and home network essentials, including system settings that can reduce online exposure to cyber security threats when teleworking. Participants will learn to apply the Communications Security Establishment's Top Ten IT Security Actions to protect information on their home network or mobile devices.
This online self-paced course provides federal employees with the foundational knowledge and tools needed to help them meet their responsibilities in support of the protection of information, individuals and assets, as outlined in the Policy on Government Security. Participants will learn about their role in applying Government of Canada security principles and best practices in their organization.
This online self-paced course examines the key characteristics of big data, the types of data it incorporates, the benefits it can provide, and the different ways it can be applied. Participants will explore some of the fundamental security challenges of big data and review best practices for managing big data throughout its information life cycle.
This online self-paced quiz evaluates the participant's knowledge of essential information management principles and best practices. Participants will be able to assess their ability to properly manage information and data resources commonly used in their work environment.
This short online self-paced course explores how IT infrastructure can be a source of risk for organizations. Participants will learn about the specific role they play in respecting data security and protecting the integrity of their organization's information.
This video (part 3 of 3) explains how the GC Workplace Accessibility Passport functions as a secure and confidential record of information on workplace accommodation decisions for employees.
This online self-paced course investigates the most common types of network security threats, including how to prevent them and how to detect them if your system is breached. Participants will learn about the importance of stopping hackers from accessing vital data by addressing system weaknesses that can be exploited by potential attackers.
This video compares the traditional information technology (IT) model to a more modern approach that combines cloud computing with key partnerships between departmental IT and program sectors and business lines.
This video follows the story of Louis, a fictional public servant, and the cyber security challenges he faces after using the same passwords to access multiple services.
Contact us through our chatbot, general inquiries form, or call us at 819-953-5400 (NCR), 1-833-622-1310 (toll free). Our team can help you with your questions and accessibility needs.